{"id":7840,"date":"2017-09-01T18:29:51","date_gmt":"2017-09-01T16:29:51","guid":{"rendered":"https:\/\/www.agilit.law\/news\/sylvie-jonas\/"},"modified":"2020-06-18T11:47:28","modified_gmt":"2020-06-18T09:47:28","slug":"sylvie-jonas","status":"publish","type":"page","link":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/","title":{"rendered":"Articles by Sylvie JONAS"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1497731907741{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column][vc_empty_space height=&#8221;70&#8243;][vc_separator css=&#8221;.vc_custom_1497693162942{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-bottom: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1504278078822{margin-top: 0px !important;border-top-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; thb_row_title=&#8221;Save time, travel safe&#8221; thb_video_bg=&#8221;https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/06\/agilit.mp4&#8243;][vc_column thb_color=&#8221;thb-light-column&#8221; css=&#8221;.vc_custom_1497828507808{padding-top: 55px !important;padding-bottom: 40px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row_inner][vc_column_inner animation=&#8221;animation fade-in&#8221;][vc_column_text css=&#8221;.vc_custom_1592473644147{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 20px !important;}&#8221;]<\/p>\n<h1 class=\"bannerhome\" style=\"text-align: center;\"><span style=\"text-transform: uppercase;\">ARTICLES BY sylvie jonas<\/span><\/h1>\n<div style=\"height: 35px;\"><\/div>\n<p style=\"text-align: center;\"><a class=\"petitbt\" href=\"https:\/\/www.agilit.law\/en\/about\/team\/sylvie-jonas\/\"><i class=\"fa fa-long-arrow-right\"><\/i> See profile<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1534264599570{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-top: 40px !important;padding-bottom: 0px !important;background-color: #ffffff !important;}&#8221; thb_row_title=&#8221;Save time, travel safe&#8221;][vc_column offset=&#8221;vc_col-lg-offset-1 vc_col-lg-10&#8243;][vc_column_text]<!-- The Grid Plugin Version 2.6.60 --><!-- The Grid Wrapper Start --><div class=\"tg-grid-wrapper tg-txt full-height\" id=\"grid-2548\" data-version=\"2.6.60\"><!-- The Grid Styles --><style class=\"tg-grid-styles\" type=\"text\/css\" scoped>#grid-2548 .tg-nav-color:not(.dots):not(.tg-dropdown-value):not(.tg-dropdown-title):hover,#grid-2548 .tg-nav-color:hover .tg-nav-color,#grid-2548 .tg-page-number.tg-page-current,#grid-2548 .tg-filter.tg-filter-active span{color:#ff6863}#grid-2548 .tg-filter:before,#grid-2548 .tg-filter.tg-filter-active:before{color:#999999}#grid-2548 .tg-dropdown-holder,#grid-2548 .tg-search-inner,#grid-2548 .tg-sorter-order{border:1px solid #DDDDDD}#grid-2548 .tg-search-clear,#grid-2548 .tg-search-clear:hover{border:none;border-left:1px solid #DDDDDD}.tg-txt .tg-nav-font,.tg-txt input[type=text].tg-search{font-size:14px;font-weight:600}.tg-txt .tg-search::-webkit-input-placeholder{font-size:14px}.tg-txt .tg-search::-moz-placeholder{font-size:14px}.tg-txt .tg-search:-ms-input-placeholder{font-size:14px}.tg-txt .tg-icon-left-arrow:before{content:\"\\e604\";font-size:32px;font-weight:100}.tg-txt .tg-icon-right-arrow:before{content:\"\\e602\";font-size:32px;font-weight:100}.tg-txt .tg-icon-dropdown-open:before,.tg-txt .tg-icon-sorter-down:before{content:\"\\e60a\"}.tg-txt .tg-icon-sorter-up:before{content:\"\\e609\"}.tg-txt .tg-search-clear:before{content:\"\\e611\";font-weight:300}.tg-txt .tg-search-icon:before{content:\"\\e62e\";font-size:16px;font-weight:600}#grid-2548 .tg-nav-color,#grid-2548 .tg-search-icon:hover:before,#grid-2548 .tg-search-icon:hover input,#grid-2548 .tg-disabled:hover .tg-icon-left-arrow,#grid-2548 .tg-disabled:hover .tg-icon-right-arrow,#grid-2548 .tg-dropdown-title.tg-nav-color:hover{color:#999999}#grid-2548 input.tg-search:hover{color:#999999 !important}#grid-2548 input.tg-search::-webkit-input-placeholder{color:#999999}#grid-2548 input.tg-search::-moz-placeholder{color:#999999;opacity:1}#grid-2548 input.tg-search:-ms-input-placeholder{color:#999999}.grid-2548 .tg-dropdown-item{color:#777777;background:#ffffff}.grid-2548 .tg-filter-active,.grid-2548 .tg-dropdown-item:hover{color:#444444;background:#f5f6fa}#grid-2548 .tg-slider-bullets li.tg-active-item span{background:#59585b}#grid-2548 .tg-slider-bullets li span{background:#DDDDDD}.tg-my-skin-qomino a:not([class*=\"tg-element-\"]),.tg-my-skin-qomino a:not([class*=\"tg-element-\"]):active,.tg-my-skin-qomino a:not([class*=\"tg-element-\"]):focus,.tg-my-skin-qomino [class*=\"tg-element-\"] *:not(del){margin:0;padding:0;color:inherit !important;text-align:inherit;font-size:inherit;font-style:inherit;line-height:inherit;font-weight:inherit;text-transform:inherit;text-decoration:inherit;-webkit-box-shadow:none;box-shadow:none;border:none}.tg-my-skin-qomino [class*=\"tg-element-\"],.tg-my-skin-qomino .tg-item-overlay,.tg-my-skin-qomino .tg-center-holder,.tg-my-skin-qomino .tg-center-inner > *{vertical-align:middle}.tg-my-skin-qomino .tg-item-media-holder{overflow:visible !important}.tg-my-skin-qomino .tg-item-overlay{background-color:rgba(12,12,12,0.14) !important;background-size:contain;background-repeat:repeat-x;background-position-y:0px;position:absolute;display:block;top:0;left:0;bottom:0;right:0;background-image:url(https:\/\/www.agilit.law\/wp-content\/uploads\/2018\/08\/a-3.png) !important;opacity:1;visibility:visible;-webkit-transition:all 700ms ease !important;-moz-transition:all 700ms ease !important;-ms-transition:all 700ms ease !important;transition:all 700ms ease !important}.tg-my-skin-qomino:not(.tg-force-play):not(.tg-is-playing):hover .tg-item-overlay{opacity:0;visibility:hidden}.tg-my-skin-qomino:not(.tg-force-play):not(.tg-is-playing) .tg-item-media-inner > *{-webkit-transition:all 360ms ease;-moz-transition:all 360ms ease;-ms-transition:all 360ms ease;transition:all 360ms ease;-webkit-transform:perspective(500px)scale3d(1.03,1.03,1);-moz-transform:perspective(500px)scale3d(1.03,1.03,1);-ms-transform:perspective(500px)scale3d(1.03,1.03,1);transform:perspective(500px)scale3d(1.03,1.03,1)}.tg-my-skin-qomino:not(.tg-force-play):not(.tg-is-playing) .tg-item-media-holder:hover .tg-item-media-inner > *{-webkit-transform:perspective(500px)scale3d(1,1,1);-moz-transform:perspective(500px)scale3d(1,1,1);-ms-transform:perspective(500px)scale3d(1,1,1);transform:perspective(500px)scale3d(1,1,1)}.tg-my-skin-qomino .tg-bottom-holder{-webkit-transition:all 410ms ease-out;-moz-transition:all 410ms ease-out;-ms-transition:all 410ms ease-out;transition:all 410ms ease-out;-webkit-transform:translate3d(0px,50px,0px);-moz-transform:translate3d(0px,50px,0px);-ms-transform:translate3d(0px,50px,0px);transform:translate3d(0px,50px,0px)}.tg-my-skin-qomino:hover .tg-bottom-holder{-webkit-transform:translate3d(0,0,0);-moz-transform:translate3d(0,0,0);-ms-transform:translate3d(0,0,0);transform:translate3d(0,0,0)}.tg-my-skin-qomino div.tg-item-media-content{text-align:center;background-color:rgba(255,255,255,0.01)}.tg-my-skin-qomino .tg-element-1{position:relative;font-size:17px;line-height:24px;font-weight:400;text-transform:none;display:block;margin:0 11px;padding:8px 0;opacity:1;visibility:visible;-webkit-transition:all 400ms ease;-moz-transition:all 400ms ease;-ms-transition:all 400ms ease;transition:all 400ms ease}.tg-my-skin-qomino:hover .tg-element-1{opacity:0;visibility:hidden}.tg-my-skin-qomino .tg-element-3{position:relative;font-size:11px;line-height:22px;font-weight:600;text-transform:uppercase;text-align:center;letter-spacing:0.7px;background-color:#ff5a5f !important;display:inline-block;margin:3px 3px 20px;padding:4px 13px 5px;border-radius:4px;opacity:0;visibility:hidden;-webkit-transition:all 400ms ease-in;-moz-transition:all 400ms ease-in;-ms-transition:all 400ms ease-in;transition:all 400ms ease-in}.tg-my-skin-qomino:hover .tg-element-3{opacity:1;visibility:visible}.tg-item .tg-dark div,.tg-item .tg-dark h1,.tg-item .tg-dark h1 a,.tg-item .tg-dark h2,.tg-item .tg-dark h2 a,.tg-item .tg-dark h3,.tg-item .tg-dark h3 a,.tg-item .tg-dark h4,.tg-item .tg-dark h4 a,.tg-item .tg-dark h5,.tg-item .tg-dark h5 a,.tg-item .tg-dark h6,.tg-item .tg-dark h6 a,.tg-item .tg-dark a,.tg-item .tg-dark a.tg-link-url,.tg-item .tg-dark i,.tg-item .tg-dark .tg-media-button,.tg-item .tg-dark .tg-item-price span{color:#444444;fill:#444444;stroke:#444444;border-color:#444444}.tg-item .tg-dark p,.tg-item .tg-dark ol,.tg-item .tg-dark ul,.tg-item .tg-dark li{color:#777777;fill:#777777;stroke:#777777;border-color:#777777}.tg-item .tg-dark span,.tg-item .tg-dark .no-liked .to-heart-icon path,.tg-item .tg-dark .empty-heart .to-heart-icon path,.tg-item .tg-dark .tg-item-comment i,.tg-item .tg-dark .tg-item-price del span{color:#999999;fill:#999999;stroke:#999999;border-color:#999999}.tg-item .tg-light div,.tg-item .tg-light h1,.tg-item .tg-light h1 a,.tg-item .tg-light h2,.tg-item .tg-light h2 a,.tg-item .tg-light h3,.tg-item .tg-light h3 a,.tg-item .tg-light h4,.tg-item .tg-light h4 a,.tg-item .tg-light h5,.tg-item .tg-light h5 a,.tg-item .tg-light h6,.tg-item .tg-light h6 a,.tg-item .tg-light a,.tg-item .tg-light a.tg-link-url,.tg-item .tg-light i,.tg-item .tg-light .tg-media-button,.tg-item .tg-light .tg-item-price span{color:#ffffff;fill:#ffffff;stroke:#ffffff;border-color:#ffffff}.tg-item .tg-light p,.tg-item .tg-light ol,.tg-item .tg-light ul,.tg-item .tg-light li{color:#f5f5f5;fill:#f5f5f5;stroke:#f5f5f5;border-color:#f5f5f5}.tg-item .tg-light span,.tg-item .tg-light .no-liked .to-heart-icon path,.tg-item .tg-light .empty-heart .to-heart-icon path,.tg-item .tg-light .tg-item-comment i,.tg-item .tg-light .tg-item-price del span{color:#f6f6f6;fill:#f6f6f6;stroke:#f6f6f6;border-color:#f6f6f6}#grid-2548 .tg-item-content-holder{background-color:#ffffff}#grid-2548 .tg-item-overlay{background-color:rgba(22,22,22,0.65)}<\/style><!-- The Grid Item Sizer --><div class=\"tg-grid-sizer\"><\/div><!-- The Grid Gutter Sizer --><div class=\"tg-gutter-sizer\"><\/div><!-- The Grid Items Holder --><div class=\"tg-grid-holder tg-layout-grid\"  data-name=\"Sylvie JONAS\"  data-style=\"grid\" data-row=\"1\" data-layout=\"vertical\" data-rtl=\"\" data-fitrows=\"\" data-filtercomb=\"\" data-filterlogic=\"AND\" data-filterload =\"\" data-sortbyload =\"\" data-orderload =\"false\" data-fullwidth=\"\" data-fullheight=\"null\" data-gutters=\"[[320,15],[480,15],[768,15],[980,15],[1200,15],[9999,15]]\" data-slider='{\"itemNav\":\"null\",\"swingSpeed\":0.1,\"cycleBy\":\"null\",\"cycle\":5000,\"startAt\":1}' data-ratio=\"1.78\" data-cols=\"[[320,1],[480,1],[768,1],[980,3],[1200,3],[9999,3]]\" data-rows=\"[[320,200],[480,200],[768,220],[980,220],[1200,240],[9999,240]]\" data-animation='{&quot;name&quot;:&quot;Fade in&quot;,&quot;visible&quot;:&quot;&quot;,&quot;hidden&quot;:&quot;&quot;}' data-transition=\"700ms\" data-ajaxmethod=\"\" data-ajaxdelay=\"100\" data-preloader=\"\" data-itemdelay=\"100\" data-gallery=\"\" data-ajax=\"\"><!-- The Grid item #1 --><article class=\"tg-item tg-post-14720 tg-my-skin-qomino f165 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2025\/05\/2661183.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/cybersecurite-gare-a-la-surreglementation-2\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/cybersecurite-gare-a-la-surreglementation-2\/\">Le &#8220;Web sleuthing&#8221; et l&#8217;affaire Xavier Dupont de Ligon\u00e8s &#8211; Interview de notre associ\u00e9e Sylvie Jonas pour T\u00e9l\u00e9rama<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/cybersecurite-gare-a-la-surreglementation-2\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #2 --><article class=\"tg-item tg-post-14410 tg-my-skin-qomino f165 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2024\/12\/1733837145891.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/cybersecurite-gare-a-la-surreglementation\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/cybersecurite-gare-a-la-surreglementation\/\">Cybers\u00e9curit\u00e9 : gare \u00e0 la surr\u00e8glementation &#8211; Tribune de notre associ\u00e9e Sylvie Jonas pour Lex Daily News<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/cybersecurite-gare-a-la-surreglementation\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #3 --><article class=\"tg-item tg-post-14282 tg-my-skin-qomino f165 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2024\/09\/4060798-scaled.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/injure-du-president-de-la-republique-sur-les-reseaux-sociaux-que-risque-t-on-interview-de-notre-associee-sylvie-jonas-pour-rtl\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/injure-du-president-de-la-republique-sur-les-reseaux-sociaux-que-risque-t-on-interview-de-notre-associee-sylvie-jonas-pour-rtl\/\">Injure du Pr\u00e9sident de la r\u00e9publique sur les r\u00e9seaux sociaux : que risque-t-on ? (Interview de notre associ\u00e9e Sylvie Jonas pour RTL.fr)<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/internet-plateformes-communications-digitales\/injure-du-president-de-la-republique-sur-les-reseaux-sociaux-que-risque-t-on-interview-de-notre-associee-sylvie-jonas-pour-rtl\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #4 --><article class=\"tg-item tg-post-13962 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2024\/03\/Capture-lj-e1711549455420.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/table-ronde-chez-tv-branchet-interview-de-sylvie-jonas-responsabilite-en-cas-derreur-de-diagnostic-par-lia\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/table-ronde-chez-tv-branchet-interview-de-sylvie-jonas-responsabilite-en-cas-derreur-de-diagnostic-par-lia\/\">Table ronde chez TV Branchet : Interview de Sylvie Jonas &#8211; Responsabilit\u00e9 en cas d&#8217;erreur de diagnostic par l&#8217;IA<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/table-ronde-chez-tv-branchet-interview-de-sylvie-jonas-responsabilite-en-cas-derreur-de-diagnostic-par-lia\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #5 --><article class=\"tg-item tg-post-12163 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2023\/02\/security-g626584104_1920.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/promulgation-de-la-lopmi-les-nouveautes-en-matiere-de-lutte-contre-la-cybercriminalite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/promulgation-de-la-lopmi-les-nouveautes-en-matiere-de-lutte-contre-la-cybercriminalite\/\">Promulgation de la LOPMI : les nouveaut\u00e9s en mati\u00e8re de lutte contre la cybercriminalit\u00e9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/promulgation-de-la-lopmi-les-nouveautes-en-matiere-de-lutte-contre-la-cybercriminalite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #6 --><article class=\"tg-item tg-post-12021 tg-my-skin-qomino f147 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2023\/01\/Image-mise-en-avant-.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/offre-cybersecurite-board-of-cyber-agilit-fonds-dinvestissement\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/offre-cybersecurite-board-of-cyber-agilit-fonds-dinvestissement\/\">Lancement de l&#8217;offre cybers\u00e9curit\u00e9 de Board of Cyber et Agil&#8217;IT \u00e0 destination des fonds d&#8217;investissement<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/offre-cybersecurite-board-of-cyber-agilit-fonds-dinvestissement\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #7 --><article class=\"tg-item tg-post-11993 tg-my-skin-qomino f150 f165 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/12\/Deepfake-porn.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/lutter-contre-deepfake-porn-interview-laure-landes-gronowski-sylvie-jonas\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/lutter-contre-deepfake-porn-interview-laure-landes-gronowski-sylvie-jonas\/\">Comment lutter contre le deepfake porn ? Interview de nos associ\u00e9es IT, Cybercriminalit\u00e9 &#038; Data, Laure Landes-Gronowski et Sylvie Jonas<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/lutter-contre-deepfake-porn-interview-laure-landes-gronowski-sylvie-jonas\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #8 --><article class=\"tg-item tg-post-11867 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/12\/thumbnail.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/formation-cybercriminalite-anticiper-et-reagir-efficacement-par-sylvie-jonas-notre-associee-it-securite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/formation-cybercriminalite-anticiper-et-reagir-efficacement-par-sylvie-jonas-notre-associee-it-securite\/\">Formation Cybercriminalit\u00e9 : anticiper et r\u00e9agir efficacement par Sylvie Jonas, notre associ\u00e9e IT &#038; S\u00e9curit\u00e9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/formation-cybercriminalite-anticiper-et-reagir-efficacement-par-sylvie-jonas-notre-associee-it-securite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #9 --><article class=\"tg-item tg-post-11828 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/09\/1200x630wz.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/contribution-of-sylvie-jonas-our-it-and-cybersecurity-partner-to-the-book-digitalization-and-control-of-industrial-cyber-physical-systems\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/contribution-of-sylvie-jonas-our-it-and-cybersecurity-partner-to-the-book-digitalization-and-control-of-industrial-cyber-physical-systems\/\">Contribution of Sylvie Jonas, our IT and Cybersecurity partner, to the book &#8220;Digitalization and Control of Industrial Cyber-Physical Systems&#8221;<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/contribution-of-sylvie-jonas-our-it-and-cybersecurity-partner-to-the-book-digitalization-and-control-of-industrial-cyber-physical-systems\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #10 --><article class=\"tg-item tg-post-11801 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/09\/Capture-decran-2022-09-13-150732-Copie.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/intervention-de-sylvie-jonas-notre-associee-it-cybercriminalite-pour-dilitrust\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/intervention-de-sylvie-jonas-notre-associee-it-cybercriminalite-pour-dilitrust\/\">Intervention de Sylvie Jonas, notre associ\u00e9e IT &#038; Cybercriminalit\u00e9, pour DiliTrust<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/intervention-de-sylvie-jonas-notre-associee-it-cybercriminalite-pour-dilitrust\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #11 --><article class=\"tg-item tg-post-11711 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/06\/usurpation.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-5-lusurpation-didentite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-5-lusurpation-didentite\/\">L\u2019E-R\u00c9PUTATION DES PERSONNES PUBLIQUES, \u00c9PISODE 5 : L&#8217;USURPATION D&#8217;IDENTITE<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-5-lusurpation-didentite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #12 --><article class=\"tg-item tg-post-11701 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/06\/Vie-privee-et-droit-a-limage.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-4-le-droit-a-limage\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-4-le-droit-a-limage\/\">L\u2019E-R\u00c9PUTATION DES PERSONNES PUBLIQUES, \u00c9PISODE 4 : LE DROIT A L&#8217;IMAGE<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-4-le-droit-a-limage\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #13 --><article class=\"tg-item tg-post-11667 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/05\/injure-article.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/le-reputation-des-personnes-publiques-episode-3-linjure\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/le-reputation-des-personnes-publiques-episode-3-linjure\/\">L\u2019E-R\u00c9PUTATION DES PERSONNES PUBLIQUES, \u00c9PISODE 3 : L&#8217;INJURE<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/le-reputation-des-personnes-publiques-episode-3-linjure\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #14 --><article class=\"tg-item tg-post-11607 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/04\/1-6.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/la-voix-du-nord-interview-de-sylvie-jonas-sur-lusurpation-didentite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/la-voix-du-nord-interview-de-sylvie-jonas-sur-lusurpation-didentite\/\">LA VOIX DU NORD : INTERVIEW DE SYLVIE JONAS SUR L&#8217;USURPATION D&#8217;IDENTIT\u00c9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/la-voix-du-nord-interview-de-sylvie-jonas-sur-lusurpation-didentite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #15 --><article class=\"tg-item tg-post-11594 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/04\/diffamation.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-2-la-diffamation\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-2-la-diffamation\/\">L\u2019e-r\u00e9putation des personnes publiques, \u00e9pisode 2 : la diffamation<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-2-la-diffamation\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #16 --><article class=\"tg-item tg-post-11541 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/04\/e-reputation-1.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-1-quest-ce-que-le-reputation\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-1-quest-ce-que-le-reputation\/\">L&#8217;e-r\u00e9putation des personnes publiques, \u00e9pisode 1 : qu&#8217;est-ce que l&#8217;e-r\u00e9putation ?<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/le-reputation-des-personnes-publiques-episode-1-quest-ce-que-le-reputation\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #17 --><article class=\"tg-item tg-post-11504 tg-my-skin-qomino f165 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/03\/cyberscore-Copie-1.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/cyberscore-et-plateformes-numeriques\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/cyberscore-et-plateformes-numeriques\/\">CyberScore et plateformes num\u00e9riques<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/cyberscore-et-plateformes-numeriques\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #18 --><article class=\"tg-item tg-post-11432 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2022\/02\/despaired-g5c961392c_1920.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/diffamation-injure-et-service-public-quelles-regles-sappliquent\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/diffamation-injure-et-service-public-quelles-regles-sappliquent\/\">Diffamation, injure et service public\u00a0: quelles r\u00e8gles s\u2019appliquent ?<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/diffamation-injure-et-service-public-quelles-regles-sappliquent\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #19 --><article class=\"tg-item tg-post-10955 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/11\/shutterstock_309461054.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/sylvie-jonas-notre-associee-it-et-cybercriminalite-interviewee-par-leclaireur-fnac-sur-les-deepfakes-et-le-clonage-vocal\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/sylvie-jonas-notre-associee-it-et-cybercriminalite-interviewee-par-leclaireur-fnac-sur-les-deepfakes-et-le-clonage-vocal\/\">Sylvie Jonas, notre associ\u00e9e IT et cybercriminalit\u00e9, interview\u00e9e par l&#8217;Eclaireur Fnac sur les deepfakes et le clonage vocal<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/sylvie-jonas-notre-associee-it-et-cybercriminalite-interviewee-par-leclaireur-fnac-sur-les-deepfakes-et-le-clonage-vocal\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #20 --><article class=\"tg-item tg-post-10872 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/10\/2021-10-21-Interview-clean.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/on-vous-dit-tout-sur-france-3-interview-de-sylvie-jonas-sur-lusurpation-didentite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/on-vous-dit-tout-sur-france-3-interview-de-sylvie-jonas-sur-lusurpation-didentite\/\">\u00ab On vous dit tout \u00bb sur France 3 : Interview de Sylvie Jonas sur l\u2019usurpation d\u2019identit\u00e9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/securite-cybercriminalite\/on-vous-dit-tout-sur-france-3-interview-de-sylvie-jonas-sur-lusurpation-didentite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #21 --><article class=\"tg-item tg-post-10823 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/10\/Capture-slider.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercriminalite-finaliste-du-trophee-de-la-femme-cyber-2021\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercriminalite-finaliste-du-trophee-de-la-femme-cyber-2021\/\">Sylvie Jonas, notre associ\u00e9e IT &#038; Cybercriminalit\u00e9, finaliste du Troph\u00e9e de la Femme Cyber 2021<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercriminalite-finaliste-du-trophee-de-la-femme-cyber-2021\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #22 --><article class=\"tg-item tg-post-10612 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/03\/shutterstock_1352750771.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercriminalite-interviewee-par-elle-sur-le-phenomene-du-grooming\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercriminalite-interviewee-par-elle-sur-le-phenomene-du-grooming\/\">Sylvie Jonas, notre associ\u00e9e IT &#038; Cybercriminalit\u00e9, interview\u00e9e par Elle sur le ph\u00e9nom\u00e8ne du grooming<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercriminalite-interviewee-par-elle-sur-le-phenomene-du-grooming\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #23 --><article class=\"tg-item tg-post-10590 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/03\/shutterstock_438568525.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-itcybercrim-interviewee-par-les-echos-sur-les-victimes-dusurpation-didentite-fichees-a-la-banque-de-france\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-itcybercrim-interviewee-par-les-echos-sur-les-victimes-dusurpation-didentite-fichees-a-la-banque-de-france\/\">Sylvie Jonas, notre associ\u00e9e IT&#038;Cybercrim, interview\u00e9e par Les Echos sur les victimes d&#8217;usurpation d&#8217;identit\u00e9 fich\u00e9es \u00e0 la Banque de France<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-itcybercrim-interviewee-par-les-echos-sur-les-victimes-dusurpation-didentite-fichees-a-la-banque-de-france\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #24 --><article class=\"tg-item tg-post-10547 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/07\/shutterstock_1679767111.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercrim-interviewee-par-la-depeche-sur-le-trafic-de-faux-pass-sanitaires\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercrim-interviewee-par-la-depeche-sur-le-trafic-de-faux-pass-sanitaires\/\">Sylvie Jonas, notre associ\u00e9e IT &#038; Cybercrim, interview\u00e9e par LA DEPECHE sur le trafic de faux pass sanitaires<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-it-cybercrim-interviewee-par-la-depeche-sur-le-trafic-de-faux-pass-sanitaires\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #25 --><article class=\"tg-item tg-post-10534 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/07\/image-syreli.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/afnic-procedure-syreli-prise-en-compte-de-droits-obtenus-posterieurement-a-lenregistrement-dun-nom-de-domaine\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/afnic-procedure-syreli-prise-en-compte-de-droits-obtenus-posterieurement-a-lenregistrement-dun-nom-de-domaine\/\">Afnic (proc\u00e9dure Syreli) : prise en compte de droits obtenus post\u00e9rieurement \u00e0 l\u2019enregistrement d\u2019un nom de domaine<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/afnic-procedure-syreli-prise-en-compte-de-droits-obtenus-posterieurement-a-lenregistrement-dun-nom-de-domaine\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #26 --><article class=\"tg-item tg-post-10379 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/06\/technot-11.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-forum-technologies-et-notariat-technot2021\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-forum-technologies-et-notariat-technot2021\/\">Intervention de Sylvie Jonas au forum Technologies et Notariat #TECHNOT2021<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-forum-technologies-et-notariat-technot2021\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #27 --><article class=\"tg-item tg-post-10306 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/02\/Image-illustration-article-RTL.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-interviewee-par-ouest-france-au-sujet-des-groupes-facebook-denqueteurs\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-interviewee-par-ouest-france-au-sujet-des-groupes-facebook-denqueteurs\/\">Sylvie Jonas interview\u00e9e par Ouest France au sujet des groupes Facebook d&#8217;enqu\u00eateurs<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-interviewee-par-ouest-france-au-sujet-des-groupes-facebook-denqueteurs\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #28 --><article class=\"tg-item tg-post-10336 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/06\/nouveau-test.png)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/5g-and-beyond-sylvie-jonas-is-invited-to-talk-about-liability-management-based-on-contracts\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/5g-and-beyond-sylvie-jonas-is-invited-to-talk-about-liability-management-based-on-contracts\/\">5G and beyond &#8211; Sylvie Jonas is invited to talk about &#8220;Liability Management based on Contracts&#8221;<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/5g-and-beyond-sylvie-jonas-is-invited-to-talk-about-liability-management-based-on-contracts\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #29 --><article class=\"tg-item tg-post-10291 tg-my-skin-qomino f126 f134\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/02\/contract-4085336_1920.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/it-personal-data\/cyber-risk-management-based-on-contracts-a-fundamental-element-of-an-effective-cyber-governance-strategy\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/it-personal-data\/cyber-risk-management-based-on-contracts-a-fundamental-element-of-an-effective-cyber-governance-strategy\/\">Cyber Risk Management based on Contracts &#8211; a fundamental element of an effective cyber governance strategy<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/it-personal-data\/cyber-risk-management-based-on-contracts-a-fundamental-element-of-an-effective-cyber-governance-strategy\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #30 --><article class=\"tg-item tg-post-9467 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/02\/contract-4085336_1920.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/le-management-du-risque-cyber-par-le-contrat-element-essentiel-dune-strategie-de-cybersecurite-efficace\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/le-management-du-risque-cyber-par-le-contrat-element-essentiel-dune-strategie-de-cybersecurite-efficace\/\">Le management du risque cyber par le contrat, \u00e9l\u00e9ment essentiel d\u2019une strat\u00e9gie de cybers\u00e9curit\u00e9 efficace<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/le-management-du-risque-cyber-par-le-contrat-element-essentiel-dune-strategie-de-cybersecurite-efficace\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #31 --><article class=\"tg-item tg-post-9886 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2007\/12\/objets-connectes-IoT.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/objets-connectes-et-perturbation-du-reseau-4g\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/objets-connectes-et-perturbation-du-reseau-4g\/\">Objets connect\u00e9s et perturbation du r\u00e9seau 4G<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/objets-connectes-et-perturbation-du-reseau-4g\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #32 --><article class=\"tg-item tg-post-9374 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/04\/shutterstock_1064022866.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/5g-et-enjeux-de-cybersecurite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/5g-et-enjeux-de-cybersecurite\/\">5G et enjeux de cybers\u00e9curit\u00e9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/5g-et-enjeux-de-cybersecurite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #33 --><article class=\"tg-item tg-post-9321 tg-my-skin-qomino f150 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/03\/shutterstock_766923355.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/thematiques-prioritaires-de-controle-de-la-cnil-pour-2021-cybersecurite-cookies-et-donnees-de-sante\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/thematiques-prioritaires-de-controle-de-la-cnil-pour-2021-cybersecurite-cookies-et-donnees-de-sante\/\">Th\u00e9matiques prioritaires de contr\u00f4le de la CNIL pour 2021 : cybers\u00e9curit\u00e9, cookies et donn\u00e9es de sant\u00e9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/thematiques-prioritaires-de-controle-de-la-cnil-pour-2021-cybersecurite-cookies-et-donnees-de-sante\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #34 --><article class=\"tg-item tg-post-8890 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/12\/thumbnail.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/quest-ce-que-le-credential-stuffing-et-comment-sen-premunir\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/quest-ce-que-le-credential-stuffing-et-comment-sen-premunir\/\">QU\u2019EST-CE QUE LE CREDENTIAL STUFFING ET COMMENT S\u2019EN PREMUNIR ?<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/quest-ce-que-le-credential-stuffing-et-comment-sen-premunir\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #35 --><article class=\"tg-item tg-post-9183 tg-my-skin-qomino f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/04\/shutterstock_725917057-.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/code-communications-electroniques-europeen-mise-en-demeure-france-non-transposition\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/code-communications-electroniques-europeen-mise-en-demeure-france-non-transposition\/\">Code des communications \u00e9lectroniques europ\u00e9en : mise en demeure de la France pour non-transposition<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/code-communications-electroniques-europeen-mise-en-demeure-france-non-transposition\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #36 --><article class=\"tg-item tg-post-9149 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/02\/shutterstock_694606864.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-pole-it-cybercriminalite-contribue-a-un-article-de-rtl-sur-les-rancongiciels-a-la-suite-de-la-cyberattaque-de-lhopital-de-dax\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-pole-it-cybercriminalite-contribue-a-un-article-de-rtl-sur-les-rancongiciels-a-la-suite-de-la-cyberattaque-de-lhopital-de-dax\/\">Sylvie Jonas, notre associ\u00e9e (p\u00f4le IT &#038; cybercriminalit\u00e9) contribue \u00e0 un article de RTL sur les ran\u00e7ongiciels \u00e0 la suite de la cyberattaque de l\u2019h\u00f4pital de Dax<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-pole-it-cybercriminalite-contribue-a-un-article-de-rtl-sur-les-rancongiciels-a-la-suite-de-la-cyberattaque-de-lhopital-de-dax\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #37 --><article class=\"tg-item tg-post-9020 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/02\/Image-illustration-article-RTL.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-pole-it-cybercriminalite-interviewee-par-rtl-sur-la-prevention-des-violences-en-ligne\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-pole-it-cybercriminalite-interviewee-par-rtl-sur-la-prevention-des-violences-en-ligne\/\">Sylvie JONAS, notre associ\u00e9e (p\u00f4le IT &#038; Cybercriminalit\u00e9) interview\u00e9e par RTL sur la pr\u00e9vention des violences en ligne<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-notre-associee-pole-it-cybercriminalite-interviewee-par-rtl-sur-la-prevention-des-violences-en-ligne\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #38 --><article class=\"tg-item tg-post-8746 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2021\/01\/1ere-de-couverture-cybercriminalite.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-11-fiches-et-plans-daction-ecrit-par-sylvie-jonas-notre-associee-it-cybercriminalite-est-publie-et-disponible-en-librairie\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-11-fiches-et-plans-daction-ecrit-par-sylvie-jonas-notre-associee-it-cybercriminalite-est-publie-et-disponible-en-librairie\/\">La cybercriminalit\u00e9 en 11 fiches et plans d&#8217;action \u00e9crit par Sylvie Jonas, notre associ\u00e9e IT &#038; Cybercriminalit\u00e9, est publi\u00e9 et disponible en librairie !<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-11-fiches-et-plans-daction-ecrit-par-sylvie-jonas-notre-associee-it-cybercriminalite-est-publie-et-disponible-en-librairie\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #39 --><article class=\"tg-item tg-post-8718 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2018\/11\/shutterstock_569127763.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-webcast-comment-anticiper-detecter-et-repondre-aux-menaces-cyber-et-aux-incidents-de-securite-organise-par-le-reseau-ey-alumni-au-feminin-elles\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-webcast-comment-anticiper-detecter-et-repondre-aux-menaces-cyber-et-aux-incidents-de-securite-organise-par-le-reseau-ey-alumni-au-feminin-elles\/\">Intervention de Sylvie Jonas au webcast \u00ab Comment anticiper, d\u00e9tecter et r\u00e9pondre aux menaces cyber et aux incidents de s\u00e9curit\u00e9 ? \u00bb organis\u00e9 par le r\u00e9seau EY ALUMNI AU F\u00c9MININ \u00ab ELLES&#038;YOU ALUMNI \u00bb<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-webcast-comment-anticiper-detecter-et-repondre-aux-menaces-cyber-et-aux-incidents-de-securite-organise-par-le-reseau-ey-alumni-au-feminin-elles\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #40 --><article class=\"tg-item tg-post-8597 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/12\/thumbnail.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/offre-forfaitaire-cybersquatting-faux-sites-internet-et-usurpation-didentite\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/offre-forfaitaire-cybersquatting-faux-sites-internet-et-usurpation-didentite\/\">Offre forfaitaire : Cybersquatting, faux sites internet et usurpation d\u2019identit\u00e9<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/offre-forfaitaire-cybersquatting-faux-sites-internet-et-usurpation-didentite\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #41 --><article class=\"tg-item tg-post-8492 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2018\/11\/shutterstock_569127763.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-webcast-quelle-place-pour-les-femmes-en-cybersecurite-organisee-par-le-reseau-ey-alumni-au-feminin-ellesyou-alumni\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-webcast-quelle-place-pour-les-femmes-en-cybersecurite-organisee-par-le-reseau-ey-alumni-au-feminin-ellesyou-alumni\/\">Intervention de Sylvie Jonas au Webcast \u00ab Quelle place pour les femmes en cybers\u00e9curit\u00e9 \u00bb organis\u00e9 par le r\u00e9seau EY Alumni au f\u00e9minin \u00ab Elles&amp;You Alumni \u00bb<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/intervention-de-sylvie-jonas-au-webcast-quelle-place-pour-les-femmes-en-cybersecurite-organisee-par-le-reseau-ey-alumni-au-feminin-ellesyou-alumni\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #42 --><article class=\"tg-item tg-post-8459 tg-my-skin-qomino f150 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/03\/shutterstock_309461054.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-et-laure-landes-gronowski-nos-associees-du-pole-it-data-protection-referencees-par-les-expertes\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-et-laure-landes-gronowski-nos-associees-du-pole-it-data-protection-referencees-par-les-expertes\/\">Sylvie Jonas et Laure Landes-Gronowski, nos associ\u00e9es du p\u00f4le IT &#038; Data protection, r\u00e9f\u00e9renc\u00e9es par Les Expertes !<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/sylvie-jonas-et-laure-landes-gronowski-nos-associees-du-pole-it-data-protection-referencees-par-les-expertes\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #43 --><article class=\"tg-item tg-post-8405 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/11\/Image12.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/chef-dentreprise-ou-dirigeant-votre-responsabilite-personnelle-peut-elle-etre-engagee-au-regard-des-systemes-cyber-physiques\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/chef-dentreprise-ou-dirigeant-votre-responsabilite-personnelle-peut-elle-etre-engagee-au-regard-des-systemes-cyber-physiques\/\">Chef d\u2019entreprise ou dirigeant : votre responsabilit\u00e9 personnelle peut-elle \u00eatre engag\u00e9e au regard des syst\u00e8mes cyber-physiques ?<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/chef-dentreprise-ou-dirigeant-votre-responsabilite-personnelle-peut-elle-etre-engagee-au-regard-des-systemes-cyber-physiques\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #44 --><article class=\"tg-item tg-post-8221 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/03\/RGPD-Focus-recueil-consentement-e1505207466320.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\">Guide pratique &#8211; La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #45 --><article class=\"tg-item tg-post-6370 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/10\/shutterstock_246869491.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/cybersquatting-transfert-suppression-nom-domaine-abusif\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/cybersquatting-transfert-suppression-nom-domaine-abusif\/\">Cybersquatting : transfert ou suppression rapide d&#8217;un nom de domaine abusif<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/cybersquatting-transfert-suppression-nom-domaine-abusif\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #46 --><article class=\"tg-item tg-post-6173 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/10\/shutterstock_246869491.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/flash-actu-lutte-contre-la-cybercriminalite-lanssi-et-cybermalveillance-gouv-fr-font-le-point-sur-letat-du-cyber-risque-en-france\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/flash-actu-lutte-contre-la-cybercriminalite-lanssi-et-cybermalveillance-gouv-fr-font-le-point-sur-letat-du-cyber-risque-en-france\/\">FLASH ACTU : lutte contre la cybercriminalit\u00e9, l&#8217;ANSSI et cybermalveillance.gouv.fr font le point sur l&#8217;\u00e9tat du cyber-risque en France<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/flash-actu-lutte-contre-la-cybercriminalite-lanssi-et-cybermalveillance-gouv-fr-font-le-point-sur-letat-du-cyber-risque-en-france\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #47 --><article class=\"tg-item tg-post-6121 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/02\/shutterstock_680113969.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/ransomware-et-violation-de-donnees-a-caractere-personnel-quel-role-pour-le-dpo\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/ransomware-et-violation-de-donnees-a-caractere-personnel-quel-role-pour-le-dpo\/\">Ransomware et violation de donn\u00e9es \u00e0 caract\u00e8re personnel : quel r\u00f4le pour le DPO ?<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/ransomware-et-violation-de-donnees-a-caractere-personnel-quel-role-pour-le-dpo\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #48 --><article class=\"tg-item tg-post-6030 tg-my-skin-qomino f150 f74 f107 f72 f140 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/12\/shutterstock_359090318-Copie-scaled.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-societes-fusions-acquisitions\/wework-lunch-learn-bien-preparer-sa-levee-de-fonds-les-cles-du-succes\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-societes-fusions-acquisitions\/wework-lunch-learn-bien-preparer-sa-levee-de-fonds-les-cles-du-succes\/\">WeWork Lunch &#038; Learn &#8211; Bien pr\u00e9parer sa lev\u00e9e de fonds : les cl\u00e9s du succ\u00e8s !<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-societes-fusions-acquisitions\/wework-lunch-learn-bien-preparer-sa-levee-de-fonds-les-cles-du-succes\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #49 --><article class=\"tg-item tg-post-5957 tg-my-skin-qomino f73\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/02\/shutterstock_181358375-min.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/les-messages-envoyes-par-le-biais-dune-messagerie-privee-installee-sur-lordinateur-professionnel-sont-couverts-par-le-secret-des-correspondances\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/les-messages-envoyes-par-le-biais-dune-messagerie-privee-installee-sur-lordinateur-professionnel-sont-couverts-par-le-secret-des-correspondances\/\">Les messages envoy\u00e9s par le biais d\u2019une messagerie priv\u00e9e install\u00e9e sur l\u2019ordinateur professionnel sont couverts par le secret des correspondances<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/les-messages-envoyes-par-le-biais-dune-messagerie-privee-installee-sur-lordinateur-professionnel-sont-couverts-par-le-secret-des-correspondances\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #50 --><article class=\"tg-item tg-post-5819 tg-my-skin-qomino f73\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/04\/shutterstock_494120821-1-min.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/consequences-reglement-platform-to-business\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/consequences-reglement-platform-to-business\/\">Cons\u00e9quences du r\u00e8glement \u00ab Platform To Business \u00bb pour les plateformes en ligne et les entreprises utilisatrices de ces plateformes<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/consequences-reglement-platform-to-business\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #51 --><article class=\"tg-item tg-post-5711 tg-my-skin-qomino f73\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2018\/10\/pexels-photo-374016.jpeg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/flash-actu-contrats-informatiques-la-collaboration-est-une-obligation-essentielle-du-client-dans-les-contrats-informatiques-meme-si-elle-nest-pas-prevue-dans-le-contrat\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/flash-actu-contrats-informatiques-la-collaboration-est-une-obligation-essentielle-du-client-dans-les-contrats-informatiques-meme-si-elle-nest-pas-prevue-dans-le-contrat\/\">FLASH ACTU CONTRATS INFORMATIQUES : la collaboration est une obligation essentielle du client dans les contrats informatiques, m\u00eame si elle n\u2019est pas pr\u00e9vue dans le contrat !<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/flash-actu-contrats-informatiques-la-collaboration-est-une-obligation-essentielle-du-client-dans-les-contrats-informatiques-meme-si-elle-nest-pas-prevue-dans-le-contrat\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #52 --><article class=\"tg-item tg-post-5599 tg-my-skin-qomino f150 f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/03\/RGPD-Focus-recueil-consentement-e1505207466320.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/les-entreprises-doivent-se-premunir-contre-les-fuites-de-donnees-dorigine-interne\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/les-entreprises-doivent-se-premunir-contre-les-fuites-de-donnees-dorigine-interne\/\">Les entreprises doivent se pr\u00e9munir contre les fuites de donn\u00e9es d\u2019origine interne !<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/les-entreprises-doivent-se-premunir-contre-les-fuites-de-donnees-dorigine-interne\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #53 --><article class=\"tg-item tg-post-5590 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/04\/RGPD-Focus-Code-conduite-labels-certifications-e1505207482927.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/adoption-definitive-du-reglement-sur-la-cybersecurite-par-le-conseil-de-lunion-europeenne\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/adoption-definitive-du-reglement-sur-la-cybersecurite-par-le-conseil-de-lunion-europeenne\/\">Adoption d\u00e9finitive du R\u00e8glement sur la cybers\u00e9curit\u00e9 par le Conseil de l&#8217;Union europ\u00e9enne<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/adoption-definitive-du-reglement-sur-la-cybersecurite-par-le-conseil-de-lunion-europeenne\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #54 --><article class=\"tg-item tg-post-5512 tg-my-skin-qomino f73\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/01\/shutterstock_434588080.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/publication-de-la-premiere-recommandation-du-csa-dans-le-domaine-de-linternet-la-responsabilisation-des-operateurs-de-plateforme-en-hausse\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/publication-de-la-premiere-recommandation-du-csa-dans-le-domaine-de-linternet-la-responsabilisation-des-operateurs-de-plateforme-en-hausse\/\">Publication de la premi\u00e8re recommandation du CSA dans le domaine de l\u2019Internet : la responsabilisation des op\u00e9rateurs de plateforme en hausse<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/publication-de-la-premiere-recommandation-du-csa-dans-le-domaine-de-linternet-la-responsabilisation-des-operateurs-de-plateforme-en-hausse\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #55 --><article class=\"tg-item tg-post-5496 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/05\/shutterstock_572497282_modif2.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/cyberattaques-atteintes-a-le-reputation-la-levee-danonymat-par-requete-aux-fins-didentification\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/cyberattaques-atteintes-a-le-reputation-la-levee-danonymat-par-requete-aux-fins-didentification\/\">Cyberattaques, atteintes \u00e0 l&#8217;e-r\u00e9putation, cyber harc\u00e8lement,&#8230; : la requ\u00eate aux fins d\u2019identification comme outil permettant de lever l&#8217;anonymat sur internet<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/cyberattaques-atteintes-a-le-reputation-la-levee-danonymat-par-requete-aux-fins-didentification\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #56 --><article class=\"tg-item tg-post-5319 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/04\/RGPD-Focus-Code-conduite-labels-certifications-e1505207482927.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/adoption-du-reglement-sur-la-cybersecurite-par-le-parlement-europeen\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/adoption-du-reglement-sur-la-cybersecurite-par-le-parlement-europeen\/\">Adoption du r\u00e8glement sur la cybers\u00e9curit\u00e9 par le Parlement Europ\u00e9en<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/adoption-du-reglement-sur-la-cybersecurite-par-le-parlement-europeen\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #57 --><article class=\"tg-item tg-post-5229 tg-my-skin-qomino f73\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/03\/RGPD-Focus-recueil-consentement-e1505207466320.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/quels-impacts-du-brexit-sur-le-secteur-des-telecoms\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/quels-impacts-du-brexit-sur-le-secteur-des-telecoms\/\">Quels impacts du Brexit sur le secteur des t\u00e9l\u00e9coms ?<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/quels-impacts-du-brexit-sur-le-secteur-des-telecoms\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #58 --><article class=\"tg-item tg-post-5118 tg-my-skin-qomino f150 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/02\/shutterstock_181358375-min.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/droit-de-la-concurrence-et-donnees-a-caractere-personnel-coup-de-frein-de-lallemagne-a-lexploitation-croisee-des-donnees-par-facebook\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/droit-de-la-concurrence-et-donnees-a-caractere-personnel-coup-de-frein-de-lallemagne-a-lexploitation-croisee-des-donnees-par-facebook\/\">DROIT DE LA CONCURRENCE ET DONNEES A CARACTERE PERSONNEL : COUP DE FREIN DE L\u2019ALLEMAGNE A L\u2019EXPLOITATION CROISEE DES DONNEES PAR FACEBOOK<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/droit-de-la-concurrence-et-donnees-a-caractere-personnel-coup-de-frein-de-lallemagne-a-lexploitation-croisee-des-donnees-par-facebook\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #59 --><article class=\"tg-item tg-post-5095 tg-my-skin-qomino f73\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2019\/01\/shutterstock_434588080.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/orange-mise-en-demeure-par-larcep-rappel-a-lordre-quant-a-leffectivite-de-lacces-aux-offres-de-gros-pour-les-operateurs-tiers\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/orange-mise-en-demeure-par-larcep-rappel-a-lordre-quant-a-leffectivite-de-lacces-aux-offres-de-gros-pour-les-operateurs-tiers\/\">Orange mis en demeure par l\u2019Arcep : rappel \u00e0 l\u2019ordre quant \u00e0 l\u2019effectivit\u00e9 de l\u2019acc\u00e8s aux offres de gros pour les op\u00e9rateurs tiers<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/orange-mise-en-demeure-par-larcep-rappel-a-lordre-quant-a-leffectivite-de-lacces-aux-offres-de-gros-pour-les-operateurs-tiers\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #60 --><article class=\"tg-item tg-post-4573 tg-my-skin-qomino f147 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/04\/RGPD-Focus-Code-conduite-labels-certifications-e1505207482927.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/procedure-wipo-transfert-de-nom-de-domaine\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/procedure-wipo-transfert-de-nom-de-domaine\/\">Faux sites internet, sites miroirs et usurpation de nom de domaine<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/procedure-wipo-transfert-de-nom-de-domaine\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #61 --><article class=\"tg-item tg-post-2703 tg-my-skin-qomino f150 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/07\/Big-Data-4.0-e1505207515639.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/big-data-4-0\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/big-data-4-0\/\">Big Data 4.0<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/big-data-4-0\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><!-- The Grid item #62 --><article class=\"tg-item tg-post-2118 tg-my-skin-qomino f150 f73 f133\" data-row=\"1\" data-col=\"1\"><div class=\"tg-item-inner\"><div class=\"tg-item-media-holder tg-light\"><div class=\"tg-item-media-inner\"><div class=\"tg-item-image\" style=\"background-image: url(https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/06\/tribune-libre-cnil-facebook.jpg)\"><\/div><\/div><div class=\"tg-item-media-content \"><div class=\"tg-item-overlay\"><\/div><a class=\"tg-element-absolute\" target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/loi-informatique-libertes-facebook\/\"><\/a><div class=\"tg-bottom-holder\"><h2 class=\"tg-item-title tg-element-1\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/loi-informatique-libertes-facebook\/\">La loi fran\u00e7aise \u00abInformatique et Libert\u00e9s\u00bb (CNIL) s\u2019applique \u00e0 Facebook !<\/a><\/h2><div class=\"tg-element-3\"><a target=\"_self\" href=\"https:\/\/www.agilit.law\/en\/donnees-caractere-personnel\/loi-informatique-libertes-facebook\/\">Lire la suite<\/a><\/div><\/div><\/div><\/div><\/div><\/article><\/div><\/div><!-- The Grid Wrapper End -->[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Articles par Sylvie JONAS<\/p>\n","protected":false},"author":1,"featured_media":7815,"parent":7814,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"coauthors":[95],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Articles by Sylvie JONAS - AGIL&#039;IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Articles by Sylvie JONAS - AGIL&#039;IT\" \/>\n<meta property=\"og:description\" content=\"Articles par Sylvie JONAS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/\" \/>\n<meta property=\"og:site_name\" content=\"AGIL&#039;IT\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-18T09:47:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/06\/article.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Laure Landes-Gronowski, Sylvie JONAS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/\",\"url\":\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/\",\"name\":\"Articles by Sylvie JONAS - AGIL&#039;IT\",\"isPartOf\":{\"@id\":\"https:\/\/www.agilit.law\/#website\"},\"datePublished\":\"2017-09-01T16:29:51+00:00\",\"dateModified\":\"2020-06-18T09:47:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.agilit.law\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/www.agilit.law\/en\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Articles by Sylvie JONAS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.agilit.law\/#website\",\"url\":\"https:\/\/www.agilit.law\/\",\"name\":\"AGIL&#039;IT\",\"description\":\"Make things simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.agilit.law\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Articles by Sylvie JONAS - AGIL&#039;IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/","og_locale":"en_US","og_type":"article","og_title":"Articles by Sylvie JONAS - AGIL&#039;IT","og_description":"Articles par Sylvie JONAS","og_url":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/","og_site_name":"AGIL&#039;IT","article_modified_time":"2020-06-18T09:47:28+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/06\/article.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"Laure Landes-Gronowski, Sylvie JONAS"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/","url":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/","name":"Articles by Sylvie JONAS - AGIL&#039;IT","isPartOf":{"@id":"https:\/\/www.agilit.law\/#website"},"datePublished":"2017-09-01T16:29:51+00:00","dateModified":"2020-06-18T09:47:28+00:00","breadcrumb":{"@id":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.agilit.law\/en\/news\/sylvie-jonas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.agilit.law\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.agilit.law\/en\/news\/"},{"@type":"ListItem","position":3,"name":"Articles by Sylvie JONAS"}]},{"@type":"WebSite","@id":"https:\/\/www.agilit.law\/#website","url":"https:\/\/www.agilit.law\/","name":"AGIL&#039;IT","description":"Make things simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.agilit.law\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/pages\/7840"}],"collection":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/comments?post=7840"}],"version-history":[{"count":1,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/pages\/7840\/revisions"}],"predecessor-version":[{"id":7841,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/pages\/7840\/revisions\/7841"}],"up":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/pages\/7814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/media\/7815"}],"wp:attachment":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/media?parent=7840"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/coauthors?post=7840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}